


default search action
Computers & Security, Volume 57
Volume 57, March 2016
- Vikram S. Harichandran

, Frank Breitinger
, Ibrahim M. Baggili
, Andrew Marrington
:
A cyber forensics needs analysis survey: Revisiting the domain's needs a decade later. 1-13 - Alireza Shameli-Sendi, Rouzbeh Aghababaei-Barzegar, Mohamed Cheriet:

Taxonomy of information security risk assessment (ISRA). 14-30 - Malik Shahzad Kaleem Awan

, Pete Burnap
, Omer F. Rana
:
Identifying cyber risk hotspots: A framework for measuring temporal variance in computer network risk. 31-46 - Jarrod West, Maumita Bhattacharya

:
Intelligent financial fraud detection: A comprehensive review. 47-66 - Boris Sieklik, Richard Macfarlane, William J. Buchanan

:
Evaluation of TFTP DDoS amplification attack. 67-92 - Gerson de Souza Faria

, Hae Yong Kim
:
Identification of pressed keys by time difference of arrivals of mechanical vibrations. 93-105

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














